Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(helm): update chart external-secrets ( 0.12.1 → 0.13.0 ) #1544

Merged
merged 1 commit into from
Jan 23, 2025

Conversation

kireque-bot[bot]
Copy link
Contributor

@kireque-bot kireque-bot bot commented Jan 21, 2025

This PR contains the following updates:

Package Update Change
external-secrets minor 0.12.1 -> 0.13.0

Release Notes

external-secrets/external-secrets (external-secrets)

v0.13.0

Compare Source

Image: ghcr.io/external-secrets/external-secrets:v0.13.0
Image: ghcr.io/external-secrets/external-secrets:v0.13.0-ubi
Image: ghcr.io/external-secrets/external-secrets:v0.13.0-ubi-boringssl

BREAKING CHANGES

https://github.com/external-secrets/external-secrets/pull/4262 introduces a breaking change in the METADATA structure for the AWS PARAMETER STORE.

What's Changed

New Contributors

Full Changelog: external-secrets/external-secrets@v0.12.1...v0.13.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

| datasource | package          | from   | to     |
| ---------- | ---------------- | ------ | ------ |
| helm       | external-secrets | 0.12.1 | 0.13.0 |
@kireque-bot kireque-bot bot added renovate/helm Issue relates to a Renovate helm update type/minor Issue relates to a minor version bump area/kubernetes Issue relates to Kubernetes cluster/main Issue relates to the "main" cluster labels Jan 21, 2025
@kireque-bot
Copy link
Contributor Author

kireque-bot bot commented Jan 21, 2025

--- HelmRelease: security/external-secrets ClusterRole: security/external-secrets-controller

+++ HelmRelease: security/external-secrets ClusterRole: security/external-secrets-controller

@@ -48,12 +48,13 @@

   - acraccesstokens
   - clustergenerators
   - ecrauthorizationtokens
   - fakes
   - gcraccesstokens
   - githubaccesstokens
+  - quayaccesstokens
   - passwords
   - stssessiontokens
   - uuids
   - vaultdynamicsecrets
   - webhooks
   verbs:
--- HelmRelease: security/external-secrets ClusterRole: security/external-secrets-view

+++ HelmRelease: security/external-secrets ClusterRole: security/external-secrets-view

@@ -28,12 +28,13 @@

   - acraccesstokens
   - clustergenerators
   - ecrauthorizationtokens
   - fakes
   - gcraccesstokens
   - githubaccesstokens
+  - quayaccesstokens
   - passwords
   - vaultdynamicsecrets
   - webhooks
   verbs:
   - get
   - watch
--- HelmRelease: security/external-secrets ClusterRole: security/external-secrets-edit

+++ HelmRelease: security/external-secrets ClusterRole: security/external-secrets-edit

@@ -29,12 +29,13 @@

   - acraccesstokens
   - clustergenerators
   - ecrauthorizationtokens
   - fakes
   - gcraccesstokens
   - githubaccesstokens
+  - quayaccesstokens
   - passwords
   - vaultdynamicsecrets
   - webhooks
   verbs:
   - create
   - delete
--- HelmRelease: security/external-secrets Deployment: security/external-secrets-cert-controller

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets-cert-controller

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.12.1
+        image: ghcr.io/external-secrets/external-secrets:v0.13.0
         imagePullPolicy: IfNotPresent
         args:
         - certcontroller
         - --crd-requeue-interval=5m
         - --service-name=external-secrets-webhook
         - --service-namespace=security
--- HelmRelease: security/external-secrets Deployment: security/external-secrets

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.12.1
+        image: ghcr.io/external-secrets/external-secrets:v0.13.0
         imagePullPolicy: IfNotPresent
         args:
         - --concurrent=1
         - --metrics-addr=:8080
         - --loglevel=info
         - --zap-time-encoding=epoch
--- HelmRelease: security/external-secrets Deployment: security/external-secrets-webhook

+++ HelmRelease: security/external-secrets Deployment: security/external-secrets-webhook

@@ -34,13 +34,13 @@

             - ALL
           readOnlyRootFilesystem: true
           runAsNonRoot: true
           runAsUser: 1000
           seccompProfile:
             type: RuntimeDefault
-        image: ghcr.io/external-secrets/external-secrets:v0.12.1
+        image: ghcr.io/external-secrets/external-secrets:v0.13.0
         imagePullPolicy: IfNotPresent
         args:
         - webhook
         - --port=10250
         - --dns-name=external-secrets-webhook.security.svc
         - --cert-dir=/tmp/certs

@kireque-bot
Copy link
Contributor Author

kireque-bot bot commented Jan 21, 2025

--- kubernetes/main/apps/security/external-secrets/app Kustomization: flux-system/external-secrets HelmRelease: security/external-secrets

+++ kubernetes/main/apps/security/external-secrets/app Kustomization: flux-system/external-secrets HelmRelease: security/external-secrets

@@ -14,13 +14,13 @@

       chart: external-secrets
       interval: 30m
       sourceRef:
         kind: HelmRepository
         name: external-secrets
         namespace: flux-system
-      version: 0.12.1
+      version: 0.13.0
   interval: 30m
   values:
     certController:
       image:
         repository: ghcr.io/external-secrets/external-secrets
       serviceMonitor:

@kireque kireque merged commit 8a3334b into main Jan 23, 2025
14 checks passed
@kireque kireque deleted the renovate/external-secrets-0.x branch January 23, 2025 10:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/kubernetes Issue relates to Kubernetes cluster/main Issue relates to the "main" cluster renovate/helm Issue relates to a Renovate helm update type/minor Issue relates to a minor version bump
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant